Automate your user access reviews

Events

Blog posts

Follow the EBA/EIOPA guidelines to secure logical access rights

Follow the EBA/EIOPA guidelines to secure logical access rights

Nearly two years ago, the European Banking Authority (EBA) and the European Insurance and Occupational Pensions Authority (EIOPA) defined their guidelines for risk management related to both information and communication technologies (ICT) and security for the...

10 Best Practices to Optimize Your User Access Reviews

10 Best Practices to Optimize Your User Access Reviews

A tedious requirement for companies   For any organization, the user access review, otherwise known as access recertification, is an important practice. As a critical component of your Identity and Access Management (IAM) strategy, this control mechanism ensures...

Review of Infrastructure Access: How to do it? Why do we need it?

Review of Infrastructure Access: How to do it? Why do we need it?

Infrastructure access is not always well understood, controlled or reviewed. IAM/IGA projects generally focus on application rights while neglecting infrastructure access. As a result, it is common to find that accounts and the rights assigned to them accumulate...

What is a user access review?

What is a user access review?

Organizations evolve every single day. Some of the changes include the departure of an employee, the arrival of a new colleague, the implementation of an innovative application, and the launch of a project involving external service providers.  Each event impacts the...

Webinar recordings

Downloads

Videos

User Access Review Introduction

Customer Testimonials

More resources

Webinar Recordings

Videos

Downloadable content

Newsletter

Receive monthly news,
tips and helpful hints for managing your identities.